Nick recently published an article on digital security. My article piggybacks off those concepts by taking a deep dive into how to establish secure communications, something all the more critical during our hyper-reliance on remote working capabilities, online services, etc.

The Internet: Land of opportunity but fraught with stranger danger

Today’s digital landscape increases the complexity with which we communicate. Various platforms, devices, numbers, and networks create a complicated web where it’s easy to become overwhelmed. While we have more options to connect globally and rapidly share information, so do the bad guys. More options, while creating redundancy for us, present additional attack vectors for them. Hence the need for a well-established communications plan that affords you privacy and security.

“That could never happen to me”… until it does

Your individual threat model will dictate what your comms plan needs to look like, and from what it should be reasonably expected to protect you. However, there are a few general principles one can use to create a relatively secure (read: encrypted) plan that sufficiently protects you and your data. A few threat model examples follow:

Are you a power-moves state prosecutor that spends weekends righteously indicting high-ranking cartel hitmen in absentia? You need private and secure comms.

Are you a military member who’s deployed overseas (or have a security clearance, for that matter) and worked in dangerous environments against elements threatening our interests abroad? This plan is for you.

Are you a law enforcement professional that makes countless arrests of violent and dangerous criminals on a daily basis, many of who harbor no regrets harming an officer or their family? Start protecting your family with what you can control.

Are you an investigative reporter with a need to securely communicate with sources and expose wrongdoings, injustices, or malign activity? Read on.

Are you an attorney responsible for the confidential and discreet transmission of client data in support of a high-stakes business deal? Private and secure is the name of the game.